Get my own profile
Public access
View all39 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
Jonathan SmithProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Flynn WolfUniversity of Maryland at Baltimore CountyVerified email at umbc.edu
John SonchackPostdoctoral Researcher, Princeton UniversityVerified email at princeton.edu
Eric KellerUniversity of Colorado, BoulderVerified email at colorado.edu
Daniel S. RocheAssociate Professor of Computer Science, United States Naval AcademyVerified email at usna.edu
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Seung Geol ChoiAssociate Professor, US Naval AcademyVerified email at usna.edu
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Philipp MarkertPostdoc @ Ruhr University BochumVerified email at rub.de
Maximilian GollaMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Andrew G. WestPrincipal Research Scientist, Verisign / Verisign LabsVerified email at verisign.com
Katherine L. GibsonUniversity of PennsylvaniaVerified email at seas.upenn.edu
Travis MayberryUS Naval AcademyVerified email at usna.edu
Hirak RayUser Experience Researcher, UVaVerified email at umbc.edu
Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
Jian ChangUniversity of PennsylvaniaVerified email at cis.upenn.edu
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Benjamin SappWaymoVerified email at google.com